From b30bc4c3ba7cf0db84272937016c3e5717265fa1 Mon Sep 17 00:00:00 2001 From: bpmcdevitt Date: Tue, 15 Apr 2025 01:11:56 +0000 Subject: [PATCH] Update recent feed data --- exploits/2025/CVE-2025-24813.json | 263 ++++++++++++++++++++++++++++++ exploits/2025/CVE-2025-2510.json | 11 ++ exploits/2025/CVE-2025-2516.json | 20 +++ 3 files changed, 294 insertions(+) create mode 100644 exploits/2025/CVE-2025-24813.json create mode 100644 exploits/2025/CVE-2025-2510.json create mode 100644 exploits/2025/CVE-2025-2516.json diff --git a/exploits/2025/CVE-2025-24813.json b/exploits/2025/CVE-2025-24813.json new file mode 100644 index 0000000..d24ff74 --- /dev/null +++ b/exploits/2025/CVE-2025-24813.json @@ -0,0 +1,263 @@ +[ + { + "name": "POC-CVE-2025-24813", + "full_name": "absholi7ly/POC-CVE-2025-24813", + "html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813", + "description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.", + "stargazers_count": 106, + "forks_count": 28, + "created_at": "2025-03-14T07:36:58Z" + }, + { + "name": "CVE-2025-24813-PoC", + "full_name": "iSee857/CVE-2025-24813-PoC", + "html_url": "https://github.com/iSee857/CVE-2025-24813-PoC", + "description": "Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)", + "stargazers_count": 79, + "forks_count": 25, + "created_at": "2025-03-13T10:00:03Z" + }, + { + "name": "CVE-2025-24813", + "full_name": "MuhammadWaseem29/CVE-2025-24813", + "html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24813", + "description": null, + "stargazers_count": 29, + "forks_count": 6, + "created_at": "2025-04-05T18:57:08Z" + }, + { + "name": "cve-2025-24813_poc", + "full_name": "FY036/cve-2025-24813_poc", + "html_url": "https://github.com/FY036/cve-2025-24813_poc", + "description": "cve-2025-24813验证脚本", + "stargazers_count": 11, + "forks_count": 1, + "created_at": "2025-03-14T07:41:40Z" + }, + { + "name": "CVE-2025-24813", + "full_name": "charis3306/CVE-2025-24813", + "html_url": "https://github.com/charis3306/CVE-2025-24813", + "description": "CVE-2025-24813利用工具", + "stargazers_count": 10, + "forks_count": 0, + "created_at": "2025-03-16T11:59:59Z" + }, + { + "name": "Poc_for_CVE-2025-24813", + "full_name": "Franconyu/Poc_for_CVE-2025-24813", + "html_url": "https://github.com/Franconyu/Poc_for_CVE-2025-24813", + "description": "CVE-2025-24813 poc", + "stargazers_count": 7, + "forks_count": 2, + "created_at": "2025-04-10T14:49:14Z" + }, + { + "name": "CVE-2025-24813-Exploit", + "full_name": "msadeghkarimi/CVE-2025-24813-Exploit", + "html_url": "https://github.com/msadeghkarimi/CVE-2025-24813-Exploit", + "description": "Apache Tomcat Remote Code Execution (RCE) Exploit - CVE-2025-24813", + "stargazers_count": 5, + "forks_count": 1, + "created_at": "2025-03-18T08:42:12Z" + }, + { + "name": "Tomcat-CVE_2025_24813", + "full_name": "u238/Tomcat-CVE_2025_24813", + "html_url": "https://github.com/u238/Tomcat-CVE_2025_24813", + "description": "A playground to test the RCE exploit for tomcat CVE-2025-24813", + "stargazers_count": 4, + "forks_count": 0, + "created_at": "2025-03-24T18:47:40Z" + }, + { + "name": "CVE-2025-24813", + "full_name": "AsaL1n/CVE-2025-24813", + "html_url": "https://github.com/AsaL1n/CVE-2025-24813", + "description": "simple exp for CVE-2025-24813", + "stargazers_count": 3, + "forks_count": 0, + "created_at": "2025-04-05T09:07:13Z" + }, + { + "name": "CVE-2025-24813_POC", + "full_name": "N0c1or/CVE-2025-24813_POC", + "html_url": "https://github.com/N0c1or/CVE-2025-24813_POC", + "description": "CVE-2025-24813_POC", + "stargazers_count": 3, + "forks_count": 0, + "created_at": "2025-03-14T03:11:40Z" + }, + { + "name": "CVE-2025-24813", + "full_name": "beyond-devsecops/CVE-2025-24813", + "html_url": "https://github.com/beyond-devsecops/CVE-2025-24813", + "description": "Session Exploit", + "stargazers_count": 2, + "forks_count": 0, + "created_at": "2025-03-24T17:47:10Z" + }, + { + "name": "CVE-2025-24813-apache-tomcat", + "full_name": "imbas007/CVE-2025-24813-apache-tomcat", + "html_url": "https://github.com/imbas007/CVE-2025-24813-apache-tomcat", + "description": "Nuclei Template CVE-2025–24813", + "stargazers_count": 2, + "forks_count": 1, + "created_at": "2025-03-17T22:39:38Z" + }, + { + "name": "CVE-2025-24813", + "full_name": "gregk4sec/CVE-2025-24813", + "html_url": "https://github.com/gregk4sec/CVE-2025-24813", + "description": "Security Researcher", + "stargazers_count": 1, + "forks_count": 0, + "created_at": "2025-03-14T05:39:33Z" + }, + { + "name": "CVE-2025-24813", + "full_name": "AlperenY-cs/CVE-2025-24813", + "html_url": "https://github.com/AlperenY-cs/CVE-2025-24813", + "description": " Create lab for CVE-2025-24813", + "stargazers_count": 1, + "forks_count": 0, + "created_at": "2025-03-28T09:44:28Z" + }, + { + "name": "CVE-2025-24813-POC", + "full_name": "Alaatk/CVE-2025-24813-POC", + "html_url": "https://github.com/Alaatk/CVE-2025-24813-POC", + "description": "CVE-2025-24813 Apache Tomcat RCE Proof of Concept (PoC)", + "stargazers_count": 1, + "forks_count": 0, + "created_at": "2025-03-21T18:05:27Z" + }, + { + "name": "CVE-2025-24813-Scanner", + "full_name": "issamjr/CVE-2025-24813-Scanner", + "html_url": "https://github.com/issamjr/CVE-2025-24813-Scanner", + "description": "CVE-2025-24813 - Apache Tomcat Vulnerability Scanner", + "stargazers_count": 1, + "forks_count": 0, + "created_at": "2025-03-17T03:58:34Z" + }, + { + "name": "CVE-2025-24813-PoC", + "full_name": "tonyarris/CVE-2025-24813-PoC", + "html_url": "https://github.com/tonyarris/CVE-2025-24813-PoC", + "description": "A PoC for CVE-2025-24813", + "stargazers_count": 1, + "forks_count": 0, + "created_at": "2025-03-22T15:16:41Z" + }, + { + "name": "CVE-2025-24813", + "full_name": "manjula-aw/CVE-2025-24813", + "html_url": "https://github.com/manjula-aw/CVE-2025-24813", + "description": "This repository contains a shell script based POC on Apache Tomcat CVE-2025-24813. It allow you to easily test the vulnerability on any version of Apache Tomcat", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-03-30T09:39:45Z" + }, + { + "name": "CVE-2025-24813-checker", + "full_name": "horsehacks/CVE-2025-24813-checker", + "html_url": "https://github.com/horsehacks/CVE-2025-24813-checker", + "description": "Hello researchers, I have a checker for the recent vulnerability CVE-2025-24813-checker.", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-04-07T22:43:56Z" + }, + { + "name": "Tomcat-CVE-2025-24813", + "full_name": "B1gN0Se/Tomcat-CVE-2025-24813", + "html_url": "https://github.com/B1gN0Se/Tomcat-CVE-2025-24813", + "description": null, + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-03-31T19:01:28Z" + }, + { + "name": "CVE-2025-24813", + "full_name": "GadaLuBau1337/CVE-2025-24813", + "html_url": "https://github.com/GadaLuBau1337/CVE-2025-24813", + "description": null, + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-04-08T14:52:37Z" + }, + { + "name": "lab-cve-2025-24813", + "full_name": "ps-interactive/lab-cve-2025-24813", + "html_url": "https://github.com/ps-interactive/lab-cve-2025-24813", + "description": "Resources for teh Apache Tomcat CVE lab", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-03-19T19:55:02Z" + }, + { + "name": "CVE-2025-24813-POC", + "full_name": "La3B0z/CVE-2025-24813-POC", + "html_url": "https://github.com/La3B0z/CVE-2025-24813-POC", + "description": " CVE-2025-24813-POC JSP Web Shell Uploader", + "stargazers_count": 0, + "forks_count": 1, + "created_at": "2025-04-06T19:36:48Z" + }, + { + "name": "CVE-2025-24813-Scanner", + "full_name": "Mattb709/CVE-2025-24813-Scanner", + "html_url": "https://github.com/Mattb709/CVE-2025-24813-Scanner", + "description": "CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat servers vulnerable to CVE-2025-24813, an arbitrary file upload vulnerability leading to remote code execution (RCE) via insecure PUT method handling and jsessionid exploitation.", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-04-12T19:12:39Z" + }, + { + "name": "CVE-2025-24813-POC", + "full_name": "f8l124/CVE-2025-24813-POC", + "html_url": "https://github.com/f8l124/CVE-2025-24813-POC", + "description": "A simple, easy-to-use POC for CVE-2025-42813 (Apache Tomcat versions below 9.0.99).", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-04-09T15:20:32Z" + }, + { + "name": "CVE-2025-24813-noPoC", + "full_name": "Heimd411/CVE-2025-24813-noPoC", + "html_url": "https://github.com/Heimd411/CVE-2025-24813-noPoC", + "description": null, + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-04-07T16:17:06Z" + }, + { + "name": "Spring-Boot-Tomcat-CVE-2025-24813", + "full_name": "n0n-zer0/Spring-Boot-Tomcat-CVE-2025-24813", + "html_url": "https://github.com/n0n-zer0/Spring-Boot-Tomcat-CVE-2025-24813", + "description": "POC for CVE-2025-24813 using Spring-Boot", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-03-20T22:52:00Z" + }, + { + "name": "Apache-Tomcat-Vulnerability-POC-CVE-2025-24813", + "full_name": "michael-david-fry/Apache-Tomcat-Vulnerability-POC-CVE-2025-24813", + "html_url": "https://github.com/michael-david-fry/Apache-Tomcat-Vulnerability-POC-CVE-2025-24813", + "description": "Apache Tomcat Vulnerability POC (CVE-2025-24813)", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-03-19T14:32:01Z" + }, + { + "name": "CVE-2025-24813-PoC-Apache-Tomcat-RCE", + "full_name": "Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE", + "html_url": "https://github.com/Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE", + "description": "A Python proof-of-concept exploit for CVE-2025-24813 - Unauthenticated RCE in Apache Tomcat (v9.0.0-9.0.98/10.1.0-10.1.34/11.0.0-11.0.2) via malicious Java object deserialization. Includes safe detection mode and custom payload support.", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-04-12T17:38:02Z" + } +] \ No newline at end of file diff --git a/exploits/2025/CVE-2025-2510.json b/exploits/2025/CVE-2025-2510.json new file mode 100644 index 0000000..9af10c5 --- /dev/null +++ b/exploits/2025/CVE-2025-2510.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2025-25101", + "full_name": "Nxploited/CVE-2025-25101", + "html_url": "https://github.com/Nxploited/CVE-2025-25101", + "description": "WordPress Munk Sites plugin <= 1.0.7 - CSRF to Arbitrary Plugin Installation vulnerability", + "stargazers_count": 1, + "forks_count": 0, + "created_at": "2025-03-14T02:44:39Z" + } +] \ No newline at end of file diff --git a/exploits/2025/CVE-2025-2516.json b/exploits/2025/CVE-2025-2516.json new file mode 100644 index 0000000..5e7d08b --- /dev/null +++ b/exploits/2025/CVE-2025-2516.json @@ -0,0 +1,20 @@ +[ + { + "name": "CVE-2025-25163", + "full_name": "RandomRobbieBF/CVE-2025-25163", + "html_url": "https://github.com/RandomRobbieBF/CVE-2025-25163", + "description": "Plugin A/B Image Optimizer <= 3.3 - Authenticated (Subscriber+) Arbitrary File Download", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-02-18T10:25:40Z" + }, + { + "name": "CVE-2025-25163-Nuclei-Template", + "full_name": "RootHarpy/CVE-2025-25163-Nuclei-Template", + "html_url": "https://github.com/RootHarpy/CVE-2025-25163-Nuclei-Template", + "description": "This repository features a Nuclei template specifically designed to detect the Path Traversal vulnerability (CVE-2025-25163) in the Plugin A/B Image Optimizer for WordPress. This vulnerability poses a critical security risk, allowing unauthorized access to sensitive server files.", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-02-19T03:57:35Z" + } +] \ No newline at end of file